Chapter 10: Security (IDE & TDISP)

PCIe Security Architecture, Integrity, and Data Encryption

Security Overview

PCIe 6.0/7.0 introduces comprehensive security features to protect against physical and logical attacks:

Key Security Technologies

  • IDE: Integrity and Data Encryption
  • TDISP: TEE Device Interface Security Protocol
  • SPDM: Security Protocol and Data Model
  • CMA-SPDM: Component Measurement and Attestation

Threat Model

PCIe security addresses multiple attack vectors:

ThreatDescriptionMitigation
EavesdroppingReading data from PCIe linkIDE Encryption
TamperingModifying data in transitIDE Integrity (MAC)
Replay AttacksReplaying captured packetsIDE Sequence Numbers
Rogue DevicesUntrusted device insertionSPDM Authentication
Firmware AttacksCompromised device firmwareCMA-SPDM Attestation

Integrity and Data Encryption (IDE)

IDE provides link-level and selective encryption for PCIe traffic:

Requester Completer IDE Protected Link AES-GCM 256-bit Encrypted + Integrity Protected Traffic

IDE Protection Features

IDE Operation Modes

Link IDE

Protects all traffic on a link between two directly connected ports. Simpler to configure, covers entire link.

Selective IDE

Protects specific streams identified by Requester ID, Address, etc. Allows end-to-end protection through switches. Supports up to 255 IDE streams.

FeatureLink IDESelective IDE
ScopeEntire linkSpecific streams
Through SwitchesNoYes
ConfigurationSimplerMore complex
GranularityAll or nothingPer-stream
Use CaseDirect attachVM isolation

TEE Device Interface Security Protocol (TDISP)

TDISP enables secure assignment of devices to Trusted Execution Environments (TEEs):

TDISP Goals

  • Secure device assignment to TEE/confidential VMs
  • Protect device state from untrusted hypervisor
  • Establish secure channel between TEE and device
  • Support for SR-IOV Virtual Functions

TDISP Interface (TDI) States

  1. CONFIG_UNLOCKED: Initial state, device configurable
  2. CONFIG_LOCKED: Configuration locked, awaiting setup
  3. RUN: Secure interface active with TEE
  4. ERROR: Security violation detected

SPDM Integration

Security Protocol and Data Model (SPDM) provides:

SPDM messages are transported via PCIe DOE (Data Object Exchange) capability.

Component Measurement and Attestation (CMA-SPDM)

CMA enables verification of device firmware integrity:

Attestation Flow

  1. Verifier requests measurements via SPDM GET_MEASUREMENTS
  2. Device returns signed measurement report
  3. Verifier validates signature and measurements
  4. Device authorized only if attestation passes